Alert button
Picture for Md Tauhidur Rahman

Md Tauhidur Rahman

Alert button

Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software

Add code
Bookmark button
Alert button
Oct 04, 2023
Md Sadik Awal, Md Tauhidur Rahman

Viaarxiv icon

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

Add code
Bookmark button
Alert button
Jan 17, 2023
Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman

Figure 1 for Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities
Figure 2 for Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities
Figure 3 for Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities
Figure 4 for Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities
Viaarxiv icon

Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation

Add code
Bookmark button
Alert button
Nov 18, 2021
Mehdi Sadi, B. M. S. Bahar Talukder, Kaniz Mishty, Md Tauhidur Rahman

Figure 1 for Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Figure 2 for Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Figure 3 for Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Figure 4 for Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Viaarxiv icon

Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network

Add code
Bookmark button
Alert button
Mar 12, 2019
Kyle Worley, Md Tauhidur Rahman

Figure 1 for Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network
Figure 2 for Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network
Figure 3 for Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network
Figure 4 for Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network
Viaarxiv icon